{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:15:46Z","timestamp":1761581746706,"version":"3.44.0"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030009151"},{"type":"electronic","value":"9783030009168"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00916-8_14","type":"book-chapter","created":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T03:45:33Z","timestamp":1537847133000},"page":"143-152","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["PUED: A Social Spammer Detection Method Based on PU Learning and Ensemble Learning"],"prefix":"10.1007","author":[{"given":"Yuqi","family":"Song","sequence":"first","affiliation":[]},{"given":"Min","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Junliang","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Wentao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Lulan","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Xinyu","family":"Xiao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,26]]},"reference":[{"key":"14_CR1","unstructured":"Hu, X., Tang, J., Zhang, Y., Liu, H.: Social spammer detection in microblogging. In: IJCAI, vol. 13, pp. 2633\u20132639 (2013). Citeseer"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Fei, G., Mukherjee, A., Liu, B., Hsu, M., Castellanos, M., Ghosh, R.: Exploiting burstiness in reviews for review spammer detection. In: Proceedings of the Seventh International AAAI Conference on Weblogs and Social Media, pp. 175\u2013184. AAAI (2013)","DOI":"10.1609\/icwsm.v7i1.14400"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Gao, H., Hu, J., Wilson, C., Li, Z., Chen, Y., Zhao, B.Y.: Detecting and characterizing social spam campaigns. In: Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement, pp. 35\u201347. ACM (2010)","DOI":"10.1145\/1879141.1879147"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Tan, E., Guo, L., Chen, S., Zhang, X., Zhao, Y.: UNIK: unsupervised social network spam detection. In: Proceedings of the 22nd ACM International Conference on Information & Knowledge Management, pp. 479\u2013488. ACM (2013)","DOI":"10.1145\/2505515.2505581"},{"key":"14_CR5","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-981-10-2993-6_21","volume-title":"Social Media Processing","author":"B Zhang","year":"2016","unstructured":"Zhang, B., Qian, T., Chen, Y., You, Z.: Social spammer detection via structural properties in ego network. In: Li, Y., Xiang, G., Lin, H., Wang, M. (eds.) SMP 2016. CCIS, vol. 669, pp. 245\u2013256. Springer, Singapore (2016). https:\/\/doi.org\/10.1007\/978-981-10-2993-6_21"},{"key":"14_CR6","unstructured":"Benevenuto, F., Magno, G., Rodrigues, T., Almeida, V.: Detecting spammers on twitter. In: Collaboration, Electronic Messaging, Anti-abuse and Spam Conference (CEAS), vol. 6, p. 12 (2010)"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Wei, W., Joseph, K., Liu, H., Carley, K.M.: Exploring characteristics of suspended users and network stability on twitter. Soc. Netw. Anal. Mining 6(1), 51 (2016)","DOI":"10.1007\/s13278-016-0358-5"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Wu, L., Hu, X., Morstatter, F., Liu, H.: Adaptive spammer detection with sparse group modeling (2017)","DOI":"10.1609\/icwsm.v11i1.14887"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Wu, Z., Wang, Y., Wang, Y., Wu, J., Cao, J., Zhang, L.: Spammers detection from product reviews: a hybrid model. In: 2015 IEEE International Conference on Data Mining (ICDM), pp. 1039\u20131044. IEEE (2015)","DOI":"10.1109\/ICDM.2015.73"},{"key":"14_CR10","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/978-3-319-18032-8_14","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"Z Li","year":"2015","unstructured":"Li, Z., Zhang, X., Shen, H., Liang, W., He, Z.: A semi-supervised framework for social spammer detection. In: Cao, T., Lim, E.-P., Zhou, Z.-H., Ho, T.-B., Cheung, D., Motoda, H. (eds.) PAKDD 2015. LNCS (LNAI), vol. 9078, pp. 177\u2013188. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-18032-8_14"},{"key":"14_CR11","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1007\/978-3-319-47650-6_35","volume-title":"Knowledge Science, Engineering and Management","author":"W Li","year":"2016","unstructured":"Li, W., Gao, M., Rong, W., Wen, J., Xiong, Q., Ling, B.: LSSL-SSD: social spammer detection with Laplacian score and semi-supervised learning. In: Lehner, F., Fteimi, N. (eds.) KSEM 2016. LNCS (LNAI), vol. 9983, pp. 439\u2013450. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-47650-6_35"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Liu, B., Dai, Y., Li, X., Lee, W.S., Yu, P.S.: Building text classifiers using positive and unlabeled examples. In: Third IEEE International Conference on Data Mining, ICDM 2003, pp. 179\u2013186. IEEE (2003)","DOI":"10.1109\/ICDM.2003.1250918"},{"key":"14_CR13","first-page":"1","volume-title":"Ensemble Machine Learning","author":"Robi Polikar","year":"2012","unstructured":"Polikar, R.: Ensemble learning. In: Zhang, C., Ma, Y. (eds.) Ensemble Machine Learning, pp. 1\u201334. Springer, Heidelberg (2012)"},{"issue":"6","key":"14_CR14","doi-asserted-by":"publisher","first-page":"1532","DOI":"10.1109\/TKDE.2016.2526675","volume":"28","author":"Yu Sun","year":"2016","unstructured":"Sun, Y., Tang, K., Minku, L.L., Wang, S., Yao, X.: Online ensemble learning of data streams with gradually evolved classes. IEEE Trans. Knowl. Data Eng. 28(6), 1532\u20131545 (2016)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"14_CR15","doi-asserted-by":"publisher","first-page":"985","DOI":"10.1007\/978-3-642-21551-3_33","volume-title":"Handbook of Computational Statistics","author":"Peter B\u00fchlmann","year":"2011","unstructured":"B\u00fchlman, P.: Bagging, boosting and ensemble methods. In: Gentle, J., H\u00e4rdle, W., Mori, Y. (eds.) Handbook of Computational Statistics, pp. 985\u20131022. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-21551-3_33"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Benevenuto, F., Rodrigues, T., Almeida, V., Almeida, J., Gon\u00e7alves, M.: Detecting spammers and content promoters in online video social networks. In: Proceedings of the 32nd International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 620\u2013627. ACM (2009)","DOI":"10.1145\/1571941.1572047"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Collaborative Computing: Networking, Applications and Worksharing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00916-8_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T21:23:05Z","timestamp":1755638585000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00916-8_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030009151","9783030009168"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00916-8_14","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"CollaborateCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Collaborative Computing: Networking, Applications and Worksharing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Edinburgh","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"colcom2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/collaboratecom.eai-conferences.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}